Novel-view X-ray projection synthesis through geometry-integrated deep learning | 0 | 0.34 | 2022 |
On Private Data Collection of Hyperledger Fabric | 0 | 0.34 | 2021 |
Atomic Predicates-Based Data Plane Properties Verification in Software Defined Networking Using Spark | 2 | 0.41 | 2020 |
Enabling Heterogeneous Network Function Chaining | 3 | 0.40 | 2019 |
An Online Continuous Progressive Second Price Auction For Electric Vehicle Charging | 0 | 0.34 | 2019 |
An Optimal Dynamic Admission Control Policy And Upper Bound Analysis In Wireless Sensor Networks | 0 | 0.34 | 2019 |
A Multi-Channel Load Awareness Based MAC Protocol for Flying AD Hoc Networks | 0 | 0.34 | 2019 |
SecT: A Lightweight Secure Thing-Centered IoT Communication System | 0 | 0.34 | 2018 |
Error Analysis on RSS Range-Based Localization Based on General Log-Distance Path Loss Model | 0 | 0.34 | 2018 |
Preface to the Special Issue: Toward an Efficient and Effective Internet of Things for Cyber-Physical Systems | 0 | 0.34 | 2018 |
A Survey on Big Data Market: Pricing, Trading and Protection. | 8 | 0.46 | 2018 |
IoT Security: An End-to-End View and Case Study. | 0 | 0.34 | 2018 |
Moderate Deviations for Stochastic Fractional Heat Equation Driven by Fractional Noise. | 0 | 0.34 | 2018 |
A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems. | 15 | 0.59 | 2017 |
Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving. | 11 | 0.69 | 2017 |
Restricted overlay routing | 0 | 0.34 | 2016 |
S-Mirror: Mirroring Sensing Signals for Mobile Robots in Indoor Environments | 1 | 0.36 | 2016 |
Policy-Aware Virtual Machine Management in Data Center Networks | 4 | 0.41 | 2015 |
VM-tracking: Visual-motion sensing integration for real-time human tracking | 3 | 0.39 | 2015 |
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems | 15 | 0.74 | 2015 |
Dempster–Shafer Fusion of Multiple Sparse Representation and Statistical Property for SAR Target Configuration Recognition | 11 | 0.61 | 2014 |
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures | 66 | 1.94 | 2014 |
Keynote: WInternet: From Net of Things to Internet of Things | 1 | 0.35 | 2014 |
A User-Customizable Urban Traffic Information Collection Method Based on Wireless Sensor Networks | 13 | 0.69 | 2013 |
Effective RSS sampling for forensic wireless localization | 0 | 0.34 | 2013 |
Ev-Human: Human Localization Via Visual Estimation Of Body Electronic Interference | 8 | 0.49 | 2013 |
Protocol-level attacks against Tor | 8 | 0.48 | 2013 |
Asymptotic identity in min-plus algebra: a report on CPNS. | 2 | 0.47 | 2012 |
A Real-Time Vehicle Navigation Algorithm in Sensor Network Environments | 13 | 0.73 | 2012 |
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid | 46 | 1.98 | 2012 |
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems | 30 | 0.95 | 2012 |
An efficient hybrid localization scheme for Heterogeneous Wireless Networks | 1 | 0.35 | 2012 |
The Digital Marauder's Map: A WiFi Forensic Positioning Tool | 7 | 0.63 | 2012 |
Privacy-Preserving OLAP: An Information-Theoretic Approach | 2 | 0.37 | 2011 |
A General Framework for Parameterized Schedulability Bound Analysis of Real-Time Systems | 7 | 0.48 | 2010 |
Correlation-Based Traffic Analysis Attacks on Anonymity Networks | 19 | 0.87 | 2010 |
Toward statistical QoS guarantees in a differentiated services network | 6 | 0.46 | 2010 |
Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design | 0 | 0.34 | 2009 |
Proactive service migration for long-running Byzantine fault-tolerant systems | 0 | 0.34 | 2009 |
Wyner-Ziv coding based on TCQ and LDPC codes | 41 | 2.19 | 2009 |
The Digital Marauder's Map: A New Threat to Location Privacy | 4 | 0.40 | 2009 |
Stochastic Analysis of Expected Schedulability for Real-Time Tasks on a Single Computing System | 0 | 0.34 | 2008 |
Connectivity in finite ad-hoc networks. | 5 | 0.54 | 2008 |
High-Precision BLAS on FPGA-enhanced Computers | 2 | 0.41 | 2007 |
DSSS-Based Flow Marking Technique for Invisible Traceback | 81 | 2.70 | 2007 |
A Bidirectional Adaptive Sequential Gaussian Approximation for MIMO Systems. | 0 | 0.34 | 2006 |
Distributed Policy Processing In Active-Service Based Infrastructures | 0 | 0.34 | 2006 |
A Service-Oriented Integrating Practice for Data Modeling, Analysis and Visualization | 0 | 0.34 | 2006 |
Self-adaptive Worms and Countermeasures | 0 | 0.34 | 2006 |
Challenges and Opportunities of Computer and Communication Systems Research. | 0 | 0.34 | 2006 |